Congratulations to our very own, Mat Lehn, on his certification of an Aruba Mobile First Expert. Mat, who serves as a service engineer, has been certified as an Aruba Mobile First Expert, the highest certificate that Aruba, a Hewlett Packard Enterprise company, has to offer. In order to obtain this certification, you must hold all 3 expert level certificates from Aruba, which include the Aruba Certified Mobility Expert,
Looking back on 2017, it was a big year for major breaches and cyberattacks. The success of ransomware went mainstream, which lead to increasing cases of ransomware attacks. Now that 2018 is here, we’ll continue to see the development of ransomware attacks, which will deeply impact the productivity and security of organizations. Here are some predictions for additional vulnerabilities in store for businesses this year.
- Political motives on the rise: Expect to see ransomware motives
There have been a lot of reports, articles and even conflicting statements in the news about substantial security issues now known as Meltdown and Spectre. In the simplest of terms, these are two hardware flaws that affects nearly every computer and device out there, primarily impact Intel based computers. While there is a lot of valuable news information available, we wanted to share some basics with you. Rest assured, at DataVizion we stay ahead of
Today, headlines about IT security breaches read very differently than just worms and viruses of early days. Nation states actors, organized crime syndicates and idealistic “hacktivists” have catapulted cybersecurity onto the global stage. Complex attack methodologies coupled with sophisticated social engineering has resulted in the grim reality that vulnerabilities exist in every organization, regardless of size. Even worse, is that the average amount of time between a breach and discovery is eight months. This rising
Small businesses are a big market for cyber attacks. Hackers have realized that smaller businesses are easier targets for cyber attacks. According to the Verizon 2017 Data Breach Investigations Report (DBIR), 61% of cyber attack victims are business with less than 1,000 employees. So why are small business the target for these invasions? The answer is simple. Small businesses generally have weaker security. What weaknesses does your business have? Here are five of the most
Our team at DataVizion would like to extend a sincere thank you to everyone who attended our Second Annual Charity Golf Tournament Aug. 31, 2017. Together, with our partners and customers, we were able to raise $6,500 for Child Saving Institute. That’s $1,000 more than last year! The donation helps this nonprofit provides services including counseling, therapy, education and support for children and families in the community. A special thanks to Hewlett Packard Enterprise and
If you don’t have an answer to that question, you’re not alone. A study1 conducted by Robert Half Technology revealed 1 in 4 CIOs say their organization has no mobile technology strategy. However, it’s predicted that by the year 2020 mobile workers will make up more than 70 percent of the total U.S. workforce2. This is largely due to the quick rise in usage of smartphones, tablets, cloud-based applications and the Internet of Things and
At work and at home, you probably deal with technology issues more often than you would like. Sometimes, it’s the simplest of problems that cause the biggest headaches. Here are answers to some of the most common technology pain points. Is there a way to make my laptop’s battery last longer? In the past, it was commonly advised to drain your battery completely before recharging it. This rule mostly applies to older, nickel-based batteries. Most
Cyber criminals are increasingly targeting private companies in hopes of easy access. Even basic oversights, such as leaving a laptop unattended or opening a spam email, could lead to a cyber attack and ultimately cause a financial loss for your company. Having the right technology in place to prevent such attacks is a must. However, you should also provide basic training to employees, as they are a critical line of defense against cyber attacks. Here
Staying current with the latest in technology and information security can be challenging and costly for businesses of any size. Yet, not enough businesses understand the benefits of outsourcing their IT support and managed services. Don’t worry; we’ll make it easy. Here are the top three questions decision-makers considering outsourcing their IT support should ask themselves.
- Can we handle our IT support ourselves?
To really answer this question you have to